Webinar Recording

Risiken vermeiden beim Management privilegierter Identitäten

Show description
Speakers
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Als Principal Analyst ist Martin Kuppinger verantwortlich für den Bereich KuppingerCole Research. In seiner 25-jährigen IT-Erfahrung hat er bereits mehr als 50 IT-Bücher geschrieben und ist ein etablierter Referent und Moderator bei Seminaren sowie Kongressen. Sein Interesse an...
View profile
Stefan Stiehl
Senior Systems Engineer, Identity & Security Management
NetIQ Deutschland
Stefan Stiehl
Stefan Stiehl beschäftigt sich seit seinem Studium der Elektrotechnik in verschiedenen Rollen mit den Technologien von Novell. Seit 2000 arbeitet er als Senior Technology Specialist bei Novell (jetzt NetIQ) in Deutschland. In dieser Rolle verantwortet er die Unterstützung des Vertriebs...
View profile
Lead Sponsor
NetIQ
Playlist
KuppingerCole Webinars
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Aug 11, 2023

The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access Governance, which are now being enhanced by intelligent features. However, organizations still face the challenge of understanding the key functions to consider when choosing an IGA solution. Join KuppingerCole Analysts in this webinar to gain insights into the fundamental functionalities of an IGA (Identity Governance and Administration) solution. Additionally, learn about the prevailing market trends in the IGA landscape and discover how KuppingerCole Analysts can provide guidance in selecting the most suitable IGA solution for your specific needs.

Webinar Recording
The Business Value of Cloud-Based Identity Security
Mar 31, 2023

Join identity experts at KuppingerCole Analysts and SailPoint as they discuss the challenges of on-prem identity security solutions, the benefits of moving to software-as-a-service solutions, how to determine if that’s the right option, key questions to ask, how to quantify the financial impact, and how to choose the right solution.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts, will look at the how legacy IGA systems can be modernized as part of digital transformation strategies. He will also share some tips and explain what needs to be taken into consideration when moving to the cloud to achieve future-proof identity security.

Chris Gossett Senior Vice President of Technology Services at SailPoint will explain the core benefits of upgrading to cloud-based identity security, the financial and business implications, and how to get started. He will also provide an overview of SailPoint’s approach to cloud-based identity security and SailPoint’s Identity Security Cloud Upgrade Program and Assessment for existing customers.

Webinar Recording
Shut the Door to Cyber Attackers Permanently
Jul 26, 2023

Join security experts from KuppingerCole Analysts and Beyond Identity as they discuss the challenges of first-generation MFA and how to reduce friction while increasing security and improving the user experience by implementing passwordless authentication within a Zero Trust security framework.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will present a matrix that helps organizations to prioritize their Zero Trust efforts, mapped to the key building blocks of a comprehensive Zero Trust strategy.

Patrick McBride, Chief Marketing Officer at Beyond Identity will explain how organizations can eliminate passwords and friction within a Zero Trust framework. He will also provide an overview of Beyond Identity’s Zero Trust Authentication solution.

Webinar Recording
Bringing Data Back Under Control
Mar 15, 2023

Join experts from KuppingerCole Analysts and data security firm ShardSecure as they discuss data confidentiality in the context of modern infrastructures, quantum computing, and data protection regulations. They will also discuss data resilience, why it is important, and how best to achieve it.

Mike Small, Senior Analyst at KuppingerCole will Senior Analyst at KuppingerCole will introduce why data is the critical element of the modern IT infrastructure. He will also review current approaches and their effectiveness in the digital era, where the loss of data can have a devastating impact.

Pascal Cronauer, Head of EMEA, and Julian Weinberger, Field CTO, both at ShardSecure will describe a cost-effective approach to data security, provide an overview of the ShardSecure MSX solution, and explain how it has helped customers to gain control of the security of their data and reduce the cost of managing it.  

Join this webinar to:

  • Find out why data is the critical element of the modern IT infrastructure. 
  • Identify the challenges posed by data privacy and other laws and regulations.  
  • Understand the effectiveness of current approaches to data confidentiality and resiliency. 
  • Find out why encryption does not solve all data security challenges.
  • Discover the benefits of a new approach to data confidentiality and resiliency. 
  • Learn from examples of how customers are using this approach.
Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
Feb 10, 2023

In diesem Webinar lernen Sie:

  • Warum Zugriffskontrollen auch über Systemgrenzen hinweg funktionieren müssen und nicht auf SAP-Systeme beschränkt sein können
  • Wie IGA-Lösungen effektive Risikoanalysen und Zugriffskontrollen für SAP und andere kritische Anwendungen in einer Gesamtsicht ermöglichen
  • Welche Informationen im Fokus der Risikoanalyse sein müssen
  • Wie man die Sicherheit von Systemen und Daten durch Risikoanalyse und Zugriffskontrollen erhöhen und automatisiert steuern kann

Kai Boschert, Senior Advisor bei KuppingerCole Analysts, gibt einen Überblick über das sich verändernde SAP-Ökosystem und für Geschäftsanwendungen (LoB, Line of Business Applications), aber auch weitere Systeme, die mit Blick auf Funktionstrennung, Zugriffskontrolle und Risikoanalyse mit einbezogen werden. Er nennt wesentliche Anforderungen an moderne Lösungen und vergleicht Lösungsansätze von auf SAP-Umgebungen spezialisierten Lösungen bis hin zu offenen IGA-Systemen bezüglich ihrer Eignung, heutige und zukünftige IT-Infrastrukturen zu bedienen.

Klaus Hild, Principal Identity Strategist bei SailPoint und Sven Pieper, Operations Director bei Turnkey Consulting, gehen dann im Detail darauf ein, wie man risikobehaftete Zugriffsberechtigungen und deren Nutzung in SAP-Umgebungen analysieren kann, wie sich regulatorische Vorgaben einhalten lassen und Notfallzugriffe umgesetzt werden können, ohne dass dafür spezialisierte Lösungen nur für die SAP-Welt zum Einsatz kommen. Der Fokus liegt dabei auf IGA-integrierten Lösungsansätzen, die die gesamte Bandbreite von LoB-Applikationen unterstützen.

Webinar Recording
Identity Assurance Using Biometrics
Jul 21, 2023

Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.

Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.

Webinar Recording
Phishing-Resistant MFA: The Next Evolution for Strong Authentication
Apr 26, 2023

Join cybersecurity experts at KuppingerCole Analysts and workforce authentication firm Secret Double Octopus as they discuss the ways cyber-attackers are getting around MFA systems. They will also look at how organizations can better deploy MFA and go one step beyond to deliver strong security outcomes, thereby reducing risk, cost, and user friction.

Paul Fisher, Lead Analyst at KuppingerCole will look at why passwords persist despite their weaknesses, discuss the evolution and shortcomings of MFA, look at why attacks and losses continue despite the increased adoption of MFA, and explain the benefits and challenges of passwordless authentication.

Horacio Zambrano, CMO and Cyber Strategist at Secret Double Octopus will discuss what next generation authentication solutions look like, the current drivers of strong authentication, and the key considerations when choosing a passwordless authentication solution. These considerations illuminate how to best achieve success with these projects in today’s world of Zero Trust and hybrid workplaces.

Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
May 26, 2023

Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log data based Network Detection & Response solutions to improve the overall cyber security and resilience of organizations.

John Tolbert, Lead Analyst at KuppingerCole Analysts will look at reasons for deploying NDR, the various deployment models, and use cases for enterprise IT and OT environments. He will also explain how ML-enhanced detection algorithms increase confidence and reduce false positives, and discuss key requirements for choosing NDR solutions and how NDR fits into the XDR landscape.

Michael Tullius, Sales Director Germany at Exeon Analytics will discuss why NDR is necessary and how it can benefit security leaders, admins, and incident responders. He will also give examples of detectable use cases, provide an overview of Exeon’s NDR solution, and share recommendations for improving cyber resilience.

Webinar Recording
The Future of Privileged Access Management
Feb 15, 2023

How will  privileged access management change over the next years? How does this change impact your existing PAM infrastructures? What to consider for your buying decisions?

In this webinar, Morey Haber, Chief Security Officer at BeyondTrust, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, discuss trends in the broader PAM space, covering aspects such as

  • Will traditional PAM and CIEM/DREAM converge? And who needs what when?
  • Just-in-time privileges and ephemeral certificates – is this the future of PAM?
  •  Passwordless authentication, access management, single sign-on, and PAM: Where is the intersection and how to resolve conflicts?
  • Software development and application security: When is someone a privileged user?
  • 3rd party risk management: The driver for PAM adoption within the supply chain?

They share concepts and insights and talk about their perspectives on where PAM is evolving and what organizations should keep in mind for their own PAM strategies and implementations.

Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Jul 19, 2023

Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.

Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.

Webinar Recording
Unleashing the Power of Modernized Authorization
Sep 13, 2023

Join security experts from KuppingerCole Analysts and PlainID as they discuss identity management in the digital era, the limitations of ABAC and RBAC, and the benefits of policy-based access control (PBAC)

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about the latent potential for using PBAC for legacy use cases, modern authentication, and fraud prevention, and building modern digital services. He will also look at why organizations need to create a unified strategy and approach on PBAC across all areas.

Gal Helemski, PlainID co-founder and CPO, will explain how to navigate the path to modernized authorization and how to kickstart your PBAC program from initial assessment to implementation. She will be joined by Allan Foster, a long time expert and leader in Identity.

Webinar Recording
Secure DevOps: Key to Software Supply Chain Security
Nov 30, 2022

It is vital to guarantee application security at the earliest stages in the development lifecycle when source code is most vulnerable, according to Paul Fisher at KuppingerCole and Jasson Casey at Beyond Identity. Join these experts as they discuss the challenges and importance of secure DevOps.

Paul Fisher will discuss the nature of software supply chain attacks, the importance of software supply chain security, the risks posed by software with deliberately built-in weaknesses or malware, and approaches to preventing and protecting against source code compromises. Jasson Casey will explain how implementing controls that allow only verified corporate identities to commit source code, and tracking and signing every source code commit, stops adversaries from injecting malicious code into the CI/CD pipeline to ensure that the code is not compromised.